B2B (Business-to-Business)

B2B or Business-to-Business refers to a business that sells products or provides services to other businesses.

B2C (Business-to-Consumer)

B2C or Business-to-Consumer refers to a business that sells products or provides services to the end-user consumers. Another variation of this concept is D2C (direct to consumer) in which a manufacturer sells directly to consumers with little to no intermediation.

Back Door

A route through which legitimate users or criminals can bypass security systems in order to access the data they’re after. Contrasts with a front door attack, where a virus or attack is done with help from the user, for instance by downloading an infected email attachment.


Baiting describes the situation where a fraudster leaves something out like a USB drive, enticing somebody to pick it up and see what content is on it. The fraudster loads the USB drive up with things like malware and keyloggers, which attack a computer system when plugged in. This scheme is designed to take advantage of people’s curiosity.

BIN (Bank Identification Number)

A BIN or Bank Identification Number is assigned to a bank for its own credit card issuance.

The first six digits on a credit card is the BIN and can be used to identify the issuing bank that issued the card. The ISO Register of BINs/IINs for US banks is managed by the American Bankers Association. BINs (Bank Identification Numbers) can be used by online merchants as an extra measure to confirm the geographic area where the cardholder is located to the geographic area identified by the BIN. This can also be referred to as an IIN or Issuer Identification Number,

Learn More

BIN (Bank Identification Number)


The most famous and popular cryptocurrency. While it is often thought of as an anonymous payment method, bitcoin (BTC) is actually pseudonymous, which means it is possible to track someone’s payments if you can tie a real life identity to a BTC wallet.

Burn(er) Phone

The term originates from the drug dealing world, and is used to describe inexpensive mobile phones designed for temporary use. It allows fraudsters and criminals to link an account to a disposable phone number, for instance to bypass 2FA.

Today, phone numbers can be generated via burner phone apps or services. These work like prepaid phone cards, only allowing you to use them for a limited amount of time before being recirculated. Because they go through your phone’s original cellular data, they can be traced.